Views Archive

The Internet Service Provider Panix, which is easily more than 15 years old, has had its domain name stolen in what one insider calls “a malicious attack that has knocked the entire company off line until further notice.”…

Hackers penetrate T-Mobile systems, and read the email of the US Secret Service. (Hopefully not classified stuff, which had no right being on that server.)Hackers capture information from George Mason University, including names and SSNs of more than 30,000 students…

Monkeymethods.org has published a fascinating report on BitTorrent that looks at the distribution of content and download power, in light of the recent legal attacks on the network. The report notes that a small number of sites are responsible for…

It’s turning out that one of global warming’s most serious consequences, already here, is the increased prevalence of serious droughts. According to some new NCAR research, drought-striken land area has more than doubled from the 1970s to the early 2000s,…

Penn State researchers claim to have developed a “new model” for sending data through overhead electric power lines. The claim that a a kilometer of unshielded power lines could be a gigabit per second shared bandwidth between 10 or 100…

The Pew Internet & American Life Project has a new study out on the future of the Internet, briefly profiled in today’s New York Times. The study is an interesting read, as are some of the “expert” opinions offered. Not…

Apple says no; the Electronic Frontier Foundation says yes. In November, Mac blogs AppleInsider and PowerPage posted information about a product code-named “Asteroid,” designed to let musicians plug their analog gear into a Mac, and supposedly to-be-announced at this week’s…

The BBC has an interesting story about a poor woman who had the remote-control device for her brian implant stolen.The woman has a brain implant that provides tiny electrical pulses to a part of her brain. She turns it off…

C|Net has a nice interview with Straton Sclavos, CEO of VeriSign, examining whether or not terrorists could attack us with a combination cyber attack and physical attack.No hard-hitting questions here, just soft-balls about Amit Yoran’s resignation, the adoption of IPv6…

You heard it here first: the technology word of the year for 2005 will be “podcasting.” Definitions vary (which is typical for a brand new phenomenon) but the basic idea is this: people (whether amateurs or professional broadcasters) create audio…